network_attached_storage by xV3WmZE

VIEWS: 5 PAGES: 21

									           SEMINAR ON

     NETWORK ATTACHED
         STORAGE
Prepared By :
           CONTENT
1.Abstract
2.The Storage Boom
3.What Is Network Attached Storage
4.Threats to stored data
5.Uses of NAS
6.NAS Benefits
7.Limitations
8.Conclusion
               Abstract
  Data storage has become a vital, fast-growing
part of the enterprise IT environment, as new
business initiatives drive companies to
accumulate vast amounts of information. To
address the booming demand for greater shared
storage capacity, leading vendors have developed
increasingly data management solutions based on
innovative new storage architectures. Network
attached storage (NAS) technology is one of
them.
     An enterprise make use of this advanced
solution to add scalable, high-performance
storage systems.
            The storage boom
    Researches recently looked at the storage
    requirements of fifty major corporations and
    found they were growing by an average of 52%
    in 2001 and by 80% to 100% per year until
    2005.The total volume of stored electronic data,
    estimated 180,000 terabytes in 1999, has
    increased to 2 million terabytes by 2003. This
    incredible demand has shaken up the storage
    market which leads to new and more powerful
    architectures
   What is Network Attached
       Storage (NAS)?
   Network-attached storage (NAS) systems
are designed to provide a
 storage and data consolidation platform
for files that can be shared
between heterogeneous clients and
servers.
   This Network-attached storage (NAS)
    systems are generally storage devices that
    can be accessed over a computer network,
    rather than directly being connected to
    the computer (via a computer bus). This
    enables multiple users to share the same
    storage space at the same time, and often
    minimizes overhead by centrally managing
    hard disks .
A NAS device is a server that runs an
operating system specifically designed for
handling files . Network-attached storage
is accessible directly on the local area
network (LAN) through LAN protocols such
as TCP/IP.
How to access server using FTP?

    You need to use internet file trasfer
 program(FTP) that comes with UNIX/Linux or
 windows operating system.
Most service provider will provide you :
Nas server IP(e.g. 202..0.111/
 nas.myserviceprovider.com)
NAS FTP username(e.g. Nixcraft)
NAS FTP password(e.g. mysecret)
Let us assume you have file called
 myExample.zip.You can put this file to NAS
 server using following ftp command.
 ftp $ 202.54.20.111
  OR
 $ ftp nas.myserviceprovider.com
 output:
 username:nixcraft
 password:mysecret
 ftp>bin
 200 Type set to I
 ftp>prom
 Interactive mode off.
 ftp>put myExample.zip
 ftp>quit
Configure Windows 2000 For NAS
  Open Windows explorer.
 On the tools menu click map Network drive.
 Select a drive letter in the drive box.
 In the folder box type the path for the NAS
  server(\\server name\shareName) i.e.
  \\202.54.20.111\shareName
 Click the “reconnect at logon” check box.
 Click OK.
 Login to the share with the user name and
  password.
 Click OK
Using windows command line ,You can use the net command
 to map or disconnect a drive.

   Click start , and then click run.
   Type cmd in open box.
   At C:> type the following command.
   C:> net use Z:\\202.54.20.111\share
   Now access NAS using z:.
   To disconnect a mapped drive, click start and then click
    run.
   Type cmd in open box .
   At c:> type following command:
   C:> net use z:/delete
       Threats to Stored Data:
   Virus protection intended for other parts
    of the network is an inadequate solution
    for the storage system. An antivirus
    solution designed for NAS can both
    protect other users from accessing
    infected files while it also scans the entire
    NAS to remove the infection.
    Trend Micro’s Solution
  Trend Micro's ServerProtect for Network
Attached Storage (NAS) is designed to protect
stored data from infection by virus code. It also
protects network clients from infections that can
occur through the storage system. ServerProtect
for NAS scans stored data "on access," i.e.
whenever files on an NAS appliance are opened,
created or changed by a user or application.
Virus scanning takes place on separate Scan
Servers running Windows NT or 2000 and is
transparent to the end-user
Architecture of ServerProtect for
              NAS
          USES OF NAS:
• Home directory / file sharing:
• Software development
• Content Creation
•Research
•Data Archiving
          NAS BENEFITS:

Efficiency:
Increased collaboration:
Improved security:
Reduced Cost:
Reduced Server
I/O Bottlenecks:
Lower Total Cost of Ownership :
Improved Data Reliability
      and Availability:
             Limitations:
• Difficult to increment performance:


• Capacity limits:
• Finite file systems:
    Next-Generation NAS Provides
             Answers:
  Next generation NAS solutions were designed to
  address these problems.
  By combining the simplicity of NAS with the
  flexibility of a fundamentally more scalable
  architecture, next-generation NAS gives IT
  managers a solution for their enterprise-wide
  consolidation requirements. Next generation NAS
  solutions offer clustered architectures that
  increase performance, capacity and reliability but
  with a minimal increase in management
  complexity.
       ONStor is an excellent example of next
  generation NAS solution.
ONStor offers one approache to high
    performance file services:
         CONCLUSION:
   Today, NAS is the most popular form of
file level aware storage. Going forward,
NAS, or some iteration of this technology,
will be used to change the environment of
how we store and manage data and, more
importantly, how we leverage it to the
grand betterment of business.
THANK   YOU

								
To top